Tips for providing low-cost security training
Computerworld - At the height of the recession, Providence Health & Services in Seattle whacked its IT training budget by a hefty 65%. That meant conferences and most tuition-based classroom training were out of the question. So Eric Cowperthwaite, the health service provider's chief information security officer, started looking for alternate ways to provide his staff with ongoing education.
He approached officials at a local security company and offered to pay them a small amount to jointly develop training modules he could then deliver to his staff himself. What he got was a customized course on risk management methodologies and risk analysis skills.
The payback: "I was able to demonstrate to employees that I was still committed to their growth and development," Cowperthwaite said. "While I may not be able to let them go to a conference in Orlando, I'm still able to invest in my people. That was what was most critical: to show people that we were still willing to invest in them."
Cowperthwaite said he also visits with local FBI and Secret Service agents working in Seattle, Los Angeles, Portland and San Francisco -- cities where Providence Health has offices.
"Someday, something bad is going to happen to your company. A laptop may get stolen or data gets stolen or a virus gets inserted into your network. Before you ever get to that point, go find the local FBI or Secret Service office, or even your local chief of police, and invite them to lunch and get to know them," Cowperthwaite advised.
The payoff is that if and when you're faced with a security crisis, you'll have allies you can turn to. You'll also get tips on how to help law enforcement authorities solve your case, Cowperthwaite said.
He cited a time when he worked with the Secret Service on some problems with malicious software. "What they wanted from us were forensically clean versions of the computers involved," Cowperthwaite said, and knowing that upfront meant the incident could be resolved quickly.
Read more about Security in Computerworld's Security Topic Center.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts